300 lines
8.5 KiB
Python
300 lines
8.5 KiB
Python
"""
|
|
.. module: lemur.sources.service
|
|
:platform: Unix
|
|
:copyright: (c) 2015 by Netflix Inc., see AUTHORS for more
|
|
:license: Apache, see LICENSE for more details.
|
|
.. moduleauthor:: Kevin Glisson <kglisson@netflix.com>
|
|
"""
|
|
import datetime
|
|
|
|
from flask import current_app
|
|
|
|
from lemur import database
|
|
from lemur.extensions import metrics
|
|
from lemur.sources.models import Source
|
|
from lemur.certificates.models import Certificate
|
|
from lemur.certificates import service as cert_service
|
|
from lemur.endpoints import service as endpoint_service
|
|
from lemur.destinations import service as destination_service
|
|
|
|
from lemur.certificates.schemas import CertificateUploadInputSchema
|
|
|
|
from lemur.plugins.base import plugins
|
|
|
|
|
|
# TODO optimize via sql query
|
|
def _disassociate_certs_from_source(certificates, source):
|
|
current_certificates = cert_service.get_by_source(source_label=source.label)
|
|
missing = []
|
|
for cc in current_certificates:
|
|
for fc in certificates:
|
|
if fc['body'] == cc.body:
|
|
break
|
|
else:
|
|
missing.append(cc)
|
|
|
|
for c in missing:
|
|
for s in c.sources:
|
|
if s.label == source:
|
|
current_app.logger.info(
|
|
"Certificate {name} is no longer associated with {source}.".format(
|
|
name=c.name,
|
|
source=source.label
|
|
)
|
|
)
|
|
c.sources.delete(s)
|
|
|
|
|
|
# TODO optimize via sql query
|
|
def _disassociate_endpoints_from_source(endpoints, source):
|
|
current_endpoints = endpoint_service.get_by_source(source_label=source.label)
|
|
|
|
for ce in current_endpoints:
|
|
for fe in endpoints:
|
|
if ce.dnsname == fe['dnsname']:
|
|
break
|
|
else:
|
|
current_app.logger.info(
|
|
"Endpoint {dnsname} was not found during sync, removing from inventory.".format(
|
|
dnsname=ce.dnsname
|
|
)
|
|
)
|
|
metrics.send('endpoint_removed', 'counter', 1)
|
|
database.delete(ce)
|
|
|
|
|
|
def certificate_create(certificate, source):
|
|
data, errors = CertificateUploadInputSchema().load(certificate)
|
|
|
|
if errors:
|
|
raise Exception("Unable to import certificate: {reasons}".format(reasons=errors))
|
|
|
|
cert = cert_service.import_certificate(**data)
|
|
cert.description = "This certificate was automatically discovered by Lemur"
|
|
cert.sources.append(source)
|
|
sync_update_destination(cert, source)
|
|
database.update(cert)
|
|
return cert
|
|
|
|
|
|
def certificate_update(certificate, source):
|
|
for s in certificate.sources:
|
|
if s.label == source.label:
|
|
break
|
|
else:
|
|
certificate.sources.append(source)
|
|
|
|
sync_update_destination(certificate, source)
|
|
database.update(certificate)
|
|
|
|
|
|
def sync_update_destination(certificate, source):
|
|
dest = destination_service.get_by_label(source.label)
|
|
if dest:
|
|
for d in certificate.destinations:
|
|
if d.label == source.label:
|
|
break
|
|
else:
|
|
certificate.destinations.append(dest)
|
|
|
|
|
|
def sync_endpoints(source):
|
|
new, updated = 0, 0
|
|
current_app.logger.debug("Retrieving endpoints from {0}".format(source.label))
|
|
s = plugins.get(source.plugin_name)
|
|
|
|
try:
|
|
endpoints = s.get_endpoints(source.options)
|
|
except NotImplementedError:
|
|
current_app.logger.warning("Unable to sync endpoints for source {0} plugin has not implemented 'get_endpoints'".format(source.label))
|
|
return
|
|
|
|
for endpoint in endpoints:
|
|
exists = endpoint_service.get_by_dnsname(endpoint['dnsname'])
|
|
|
|
certificate_name = endpoint.pop('certificate_name', None)
|
|
certificate = endpoint.pop('certificate', None)
|
|
|
|
if certificate_name:
|
|
current_app.logger.debug(certificate_name)
|
|
cert = cert_service.get_by_name(certificate_name)
|
|
|
|
elif certificate:
|
|
cert = cert_service.get_by_body(certificate['body'])
|
|
if not cert:
|
|
cert = cert_service.import_certificate(**certificate)
|
|
|
|
if not cert:
|
|
current_app.logger.error(
|
|
"Unable to find associated certificate, be sure that certificates are sync'ed before endpoints")
|
|
continue
|
|
|
|
endpoint['certificate'] = cert
|
|
|
|
policy = endpoint.pop('policy')
|
|
|
|
policy_ciphers = []
|
|
for nc in policy['ciphers']:
|
|
policy_ciphers.append(endpoint_service.get_or_create_cipher(name=nc))
|
|
|
|
policy['ciphers'] = policy_ciphers
|
|
endpoint['policy'] = endpoint_service.get_or_create_policy(**policy)
|
|
|
|
if not exists:
|
|
endpoint_service.create(**endpoint)
|
|
new += 1
|
|
|
|
else:
|
|
endpoint_service.update(exists.id, **endpoint)
|
|
updated += 1
|
|
|
|
_disassociate_endpoints_from_source(endpoints, source)
|
|
|
|
|
|
def sync_certificates(source):
|
|
new, updated = 0, 0
|
|
|
|
current_app.logger.debug("Retrieving certificates from {0}".format(source.label))
|
|
s = plugins.get(source.plugin_name)
|
|
certificates = s.get_certificates(source.options)
|
|
|
|
for certificate in certificates:
|
|
exists = cert_service.find_duplicates(certificate)
|
|
|
|
if not exists:
|
|
certificate_create(certificate, source)
|
|
new += 1
|
|
|
|
# check to make sure that existing certificates have the current source associated with it
|
|
elif len(exists) == 1:
|
|
certificate_update(exists[0], source)
|
|
updated += 1
|
|
else:
|
|
current_app.logger.warning(
|
|
"Multiple certificates found, attempt to deduplicate the following certificates: {0}".format(
|
|
",".join([x.name for x in exists])
|
|
)
|
|
)
|
|
|
|
# we need to try and find the absent of certificates so we can properly disassociate them when they are deleted
|
|
_disassociate_certs_from_source(certificates, source)
|
|
|
|
|
|
def sync(source):
|
|
sync_certificates(source)
|
|
sync_endpoints(source)
|
|
|
|
source.last_run = datetime.datetime.utcnow()
|
|
database.update(source)
|
|
|
|
|
|
def clean(source):
|
|
s = plugins.get(source.plugin_name)
|
|
|
|
try:
|
|
certificates = s.clean(source.options)
|
|
except NotImplemented:
|
|
current_app.logger.warning("Cannot clean source: {0}, source plugin does not implement 'clean()'".format(
|
|
source.label
|
|
))
|
|
return
|
|
|
|
for certificate in certificates:
|
|
current_app.logger.debug(certificate)
|
|
cert = cert_service.get_by_name(certificate)
|
|
|
|
if cert:
|
|
current_app.logger.warning("Removed {0} from source {1} during cleaning".format(
|
|
cert.name,
|
|
source.label
|
|
))
|
|
cert.sources.remove(source)
|
|
|
|
|
|
def create(label, plugin_name, options, description=None):
|
|
"""
|
|
Creates a new source, that can then be used as a source for certificates.
|
|
|
|
:param label: Source common name
|
|
:param description:
|
|
:rtype : Source
|
|
:return: New source
|
|
"""
|
|
source = Source(label=label, options=options, plugin_name=plugin_name, description=description)
|
|
return database.create(source)
|
|
|
|
|
|
def update(source_id, label, options, description):
|
|
"""
|
|
Updates an existing source.
|
|
|
|
:param source_id: Lemur assigned ID
|
|
:param label: Source common name
|
|
:rtype : Source
|
|
:return:
|
|
"""
|
|
source = get(source_id)
|
|
|
|
source.label = label
|
|
source.options = options
|
|
source.description = description
|
|
|
|
return database.update(source)
|
|
|
|
|
|
def delete(source_id):
|
|
"""
|
|
Deletes an source.
|
|
|
|
:param source_id: Lemur assigned ID
|
|
"""
|
|
database.delete(get(source_id))
|
|
|
|
|
|
def get(source_id):
|
|
"""
|
|
Retrieves an source by it's lemur assigned ID.
|
|
|
|
:param source_id: Lemur assigned ID
|
|
:rtype : Source
|
|
:return:
|
|
"""
|
|
return database.get(Source, source_id)
|
|
|
|
|
|
def get_by_label(label):
|
|
"""
|
|
Retrieves a source by it's label
|
|
|
|
:param label:
|
|
:return:
|
|
"""
|
|
return database.get(Source, label, field='label')
|
|
|
|
|
|
def get_all():
|
|
"""
|
|
Retrieves all source currently known by Lemur.
|
|
|
|
:return:
|
|
"""
|
|
query = database.session_query(Source)
|
|
return database.find_all(query, Source, {}).all()
|
|
|
|
|
|
def render(args):
|
|
filt = args.pop('filter')
|
|
certificate_id = args.pop('certificate_id', None)
|
|
|
|
if certificate_id:
|
|
query = database.session_query(Source).join(Certificate, Source.certificate)
|
|
query = query.filter(Certificate.id == certificate_id)
|
|
else:
|
|
query = database.session_query(Source)
|
|
|
|
if filt:
|
|
terms = filt.split(';')
|
|
query = database.filter(query, Source, terms)
|
|
|
|
return database.sort_and_page(query, Source, args)
|